diff options
author | sangwan.kwon <sangwan.kwon@samsung.com> | 2017-03-14 13:18:06 +0900 |
---|---|---|
committer | sangwan.kwon <sangwan.kwon@samsung.com> | 2017-03-14 15:08:40 +0900 |
commit | 11fd00766270ad3fc740b9f1e7414b58f04ad501 (patch) | |
tree | 5880101ee413bbd40b38caca5169354e2a6e2ff6 | |
parent | 83a0814c8b7dea74e46cd07f0092f784d124843c (diff) | |
download | cert-svc-11fd00766270ad3fc740b9f1e7414b58f04ad501.tar.gz cert-svc-11fd00766270ad3fc740b9f1e7414b58f04ad501.tar.bz2 cert-svc-11fd00766270ad3fc740b9f1e7414b58f04ad501.zip |
Rename AppCustomTrustAnchor to TrustAnchor
Change-Id: Ic44a7a07fc0eb337a812d76bf139c7d0c5dcf9e9
Signed-off-by: sangwan.kwon <sangwan.kwon@samsung.com>
-rw-r--r-- | src/transec/Api.cpp | 68 | ||||
-rw-r--r-- | src/transec/CMakeLists.txt | 6 | ||||
-rw-r--r-- | src/transec/TrustAnchor.cpp (renamed from src/transec/AppCustomTrustAnchor.cpp) | 58 | ||||
-rw-r--r-- | src/transec/TrustAnchor.h (renamed from src/transec/AppCustomTrustAnchor.h) | 26 | ||||
-rw-r--r-- | src/transec/acta/app-custom-trust-anchor.h | 152 | ||||
-rw-r--r-- | src/transec/tanchor/error.h (renamed from src/transec/acta/acta-error.h) | 22 | ||||
-rw-r--r-- | src/transec/tanchor/trust-anchor.h | 152 | ||||
-rw-r--r-- | tests/transec/CMakeLists.txt | 4 | ||||
-rw-r--r-- | tests/transec/test-acta-installer.cpp | 126 | ||||
-rw-r--r-- | tests/transec/test-capi-installer.cpp | 86 | ||||
-rw-r--r-- | tests/transec/test-capi-launcher.cpp | 14 | ||||
-rw-r--r-- | tests/transec/test-installer.cpp | 126 | ||||
-rw-r--r-- | tests/transec/test-launcher.cpp (renamed from tests/transec/test-acta-launcher.cpp) | 18 |
13 files changed, 429 insertions, 429 deletions
diff --git a/src/transec/Api.cpp b/src/transec/Api.cpp index 69578ab..be85acb 100644 --- a/src/transec/Api.cpp +++ b/src/transec/Api.cpp @@ -17,59 +17,59 @@ * @file Api.cpp * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief Implementation of App custom trust anchor CAPI. + * @brief Implementation of trust anchor CAPI. */ -#include "acta/app-custom-trust-anchor.h" +#include "tanchor/trust-anchor.h" -#include "AppCustomTrustAnchor.h" +#include "TrustAnchor.h" using namespace transec; -int acta_global_install(const char *package_id, - const char *app_certificates_path, - bool with_system_certificates) +int trust_anchor_global_install(const char *package_id, + const char *app_certificates_path, + bool with_system_certificates) { - AppCustomTrustAnchor acta(package_id, app_certificates_path); - return acta.install(with_system_certificates); + TrustAnchor ta(package_id, app_certificates_path); + return ta.install(with_system_certificates); } -int acta_usr_install(const char *package_id, - const char *app_certificates_path, - uid_t uid, - bool with_system_certificates) +int trust_anchor_usr_install(const char *package_id, + const char *app_certificates_path, + uid_t uid, + bool with_system_certificates) { - AppCustomTrustAnchor acta(package_id, app_certificates_path, uid); - return acta.install(with_system_certificates); + TrustAnchor ta(package_id, app_certificates_path, uid); + return ta.install(with_system_certificates); } -int acta_global_launch(const char *package_id, - const char *app_certificates_path, - bool with_system_certificates) +int trust_anchor_global_launch(const char *package_id, + const char *app_certificates_path, + bool with_system_certificates) { - AppCustomTrustAnchor acta(package_id, app_certificates_path); - return acta.launch(with_system_certificates); + TrustAnchor ta(package_id, app_certificates_path); + return ta.launch(with_system_certificates); } -int acta_usr_launch(const char *package_id, - const char *app_certificates_path, - uid_t uid, - bool with_system_certificates) +int trust_anchor_usr_launch(const char *package_id, + const char *app_certificates_path, + uid_t uid, + bool with_system_certificates) { - AppCustomTrustAnchor acta(package_id, app_certificates_path, uid); - return acta.launch(with_system_certificates); + TrustAnchor ta(package_id, app_certificates_path, uid); + return ta.launch(with_system_certificates); } -int acta_global_uninstall(const char *package_id, - const char *app_certificates_path) +int trust_anchor_global_uninstall(const char *package_id, + const char *app_certificates_path) { - AppCustomTrustAnchor acta(package_id, app_certificates_path); - return acta.uninstall(); + TrustAnchor ta(package_id, app_certificates_path); + return ta.uninstall(); } -int acta_usr_uninstall(const char *package_id, - const char *app_certificates_path, - uid_t uid) +int trust_anchor_usr_uninstall(const char *package_id, + const char *app_certificates_path, + uid_t uid) { - AppCustomTrustAnchor acta(package_id, app_certificates_path, uid); - return acta.uninstall(); + TrustAnchor ta(package_id, app_certificates_path, uid); + return ta.uninstall(); } diff --git a/src/transec/CMakeLists.txt b/src/transec/CMakeLists.txt index 196d5e1..79a6765 100644 --- a/src/transec/CMakeLists.txt +++ b/src/transec/CMakeLists.txt @@ -27,7 +27,7 @@ SET(${TARGET_TRANSEC_LIB}_SRCS Exception.cpp Api.cpp Certificate.cpp - AppCustomTrustAnchor.cpp + TrustAnchor.cpp ) INCLUDE_DIRECTORIES( @@ -53,12 +53,12 @@ TARGET_LINK_LIBRARIES(${TARGET_TRANSEC_LIB} INSTALL(TARGETS ${TARGET_TRANSEC_LIB} DESTINATION ${LIB_INSTALL_DIR}) INSTALL(FILES - AppCustomTrustAnchor.h + TrustAnchor.h DESTINATION ${INCLUDEDIR}/cert-svc/transec ) INSTALL(DIRECTORY - acta + tanchor DESTINATION ${INCLUDEDIR}) diff --git a/src/transec/AppCustomTrustAnchor.cpp b/src/transec/TrustAnchor.cpp index dd2dea0..c67c1eb 100644 --- a/src/transec/AppCustomTrustAnchor.cpp +++ b/src/transec/TrustAnchor.cpp @@ -14,12 +14,12 @@ * limitations under the License. */ /* - * @file AppCustomTrustAnchor.cpp + * @file TrustAnchor.cpp * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief Implementation of App custom trust anchor + * @brief Implementation of trust anchor */ -#include "AppCustomTrustAnchor.h" +#include "TrustAnchor.h" #include <climits> #include <cerrno> @@ -55,7 +55,7 @@ const std::string NEW_LINE("\n"); } // namespace anonymous -class AppCustomTrustAnchor::Impl { +class TrustAnchor::Impl { public: explicit Impl(const std::string &packageId, const std::string &certsDir, @@ -88,9 +88,9 @@ private: std::vector<std::string> m_customCertsData; }; -AppCustomTrustAnchor::Impl::Impl(const std::string &packageId, - const std::string &certsDir, - uid_t uid) noexcept : +TrustAnchor::Impl::Impl(const std::string &packageId, + const std::string &certsDir, + uid_t uid) noexcept : m_packageId(packageId), m_appCertsPath(certsDir), m_uid(uid), @@ -102,8 +102,8 @@ AppCustomTrustAnchor::Impl::Impl(const std::string &packageId, m_customCertNameSet(), m_customCertsData() {} -AppCustomTrustAnchor::Impl::Impl(const std::string &packageId, - const std::string &certsDir) noexcept : +TrustAnchor::Impl::Impl(const std::string &packageId, + const std::string &certsDir) noexcept : m_packageId(packageId), m_appCertsPath(certsDir), m_uid(-1), @@ -113,15 +113,15 @@ AppCustomTrustAnchor::Impl::Impl(const std::string &packageId, m_customCertNameSet(), m_customCertsData() {} -std::string AppCustomTrustAnchor::Impl::readLink(const std::string &path) const +std::string TrustAnchor::Impl::readLink(const std::string &path) const { std::vector<char> buf(PATH_MAX); ssize_t count = readlink(path.c_str(), buf.data(), buf.size()); return std::string(buf.data(), (count > 0) ? count : 0); } -void AppCustomTrustAnchor::Impl::linkTo(const std::string &src, - const std::string &dst) const +void TrustAnchor::Impl::linkTo(const std::string &src, + const std::string &dst) const { errno = 0; int ret = ::symlink(src.c_str(), dst.c_str()); @@ -130,7 +130,7 @@ void AppCustomTrustAnchor::Impl::linkTo(const std::string &src, "[" + std::to_string(errno) + "]"); } -void AppCustomTrustAnchor::Impl::preInstall(void) const +void TrustAnchor::Impl::preInstall(void) const { runtime::File customBaseDir(this->m_customBasePath); if (customBaseDir.exists()) { @@ -153,7 +153,7 @@ void AppCustomTrustAnchor::Impl::preInstall(void) const DEBUG("Success to pre-install stage."); } -int AppCustomTrustAnchor::Impl::install(bool withSystemCerts) noexcept +int TrustAnchor::Impl::install(bool withSystemCerts) noexcept { EXCEPTION_GUARD_START @@ -193,13 +193,13 @@ int AppCustomTrustAnchor::Impl::install(bool withSystemCerts) noexcept EXCEPTION_GUARD_END } -int AppCustomTrustAnchor::Impl::uninstall(bool isRollback) noexcept +int TrustAnchor::Impl::uninstall(bool isRollback) noexcept { EXCEPTION_GUARD_START runtime::File customBaseDir(this->m_customBasePath); if (!customBaseDir.exists() && !isRollback) - throw std::invalid_argument("There is no installed acta previous."); + throw std::invalid_argument("There is no installed anchor previous."); if (customBaseDir.exists()) customBaseDir.remove(true); @@ -210,7 +210,7 @@ int AppCustomTrustAnchor::Impl::uninstall(bool isRollback) noexcept EXCEPTION_GUARD_END } -bool AppCustomTrustAnchor::Impl::isSystemCertsModified(void) const +bool TrustAnchor::Impl::isSystemCertsModified(void) const { struct stat systemAttr, customAttr; @@ -224,7 +224,7 @@ bool AppCustomTrustAnchor::Impl::isSystemCertsModified(void) const return systemAttr.st_mtime > customAttr.st_mtime; } -int AppCustomTrustAnchor::Impl::launch(bool withSystemCerts) +int TrustAnchor::Impl::launch(bool withSystemCerts) { EXCEPTION_GUARD_START @@ -262,7 +262,7 @@ int AppCustomTrustAnchor::Impl::launch(bool withSystemCerts) EXCEPTION_GUARD_END } -std::string AppCustomTrustAnchor::Impl::getUniqueHashName( +std::string TrustAnchor::Impl::getUniqueHashName( const std::string &hashName) const { int sameFileNameCnt = 0; @@ -275,7 +275,7 @@ std::string AppCustomTrustAnchor::Impl::getUniqueHashName( return uniqueName; } -void AppCustomTrustAnchor::Impl::makeCustomBundle(bool withSystemCerts) +void TrustAnchor::Impl::makeCustomBundle(bool withSystemCerts) { runtime::File customBundle(this->m_customBundlePath + "/" + BUNDLE_NAME); @@ -299,7 +299,7 @@ void AppCustomTrustAnchor::Impl::makeCustomBundle(bool withSystemCerts) DEBUG("Finish migrating previous bundle."); if (this->m_customCertsData.empty()) { - DEBUG("System certificates is changed after ACTA installation."); + DEBUG("System certificates is changed after TrustAnchor installation."); runtime::DirectoryIterator iter(this->m_appCertsPath), end; while (iter != end) { Certificate cert(iter->getPath()); @@ -318,18 +318,18 @@ void AppCustomTrustAnchor::Impl::makeCustomBundle(bool withSystemCerts) INFO("Success to make app custom bundle."); } -AppCustomTrustAnchor::AppCustomTrustAnchor(const std::string &packageId, - const std::string &certsDir, - uid_t uid) noexcept : +TrustAnchor::TrustAnchor(const std::string &packageId, + const std::string &certsDir, + uid_t uid) noexcept : m_pImpl(new Impl(packageId, certsDir, uid)) {} -AppCustomTrustAnchor::AppCustomTrustAnchor(const std::string &packageId, +TrustAnchor::TrustAnchor(const std::string &packageId, const std::string &certsDir) noexcept : m_pImpl(new Impl(packageId, certsDir)) {} -AppCustomTrustAnchor::~AppCustomTrustAnchor(void) = default; +TrustAnchor::~TrustAnchor(void) = default; -int AppCustomTrustAnchor::install(bool withSystemCerts) noexcept +int TrustAnchor::install(bool withSystemCerts) noexcept { if (this->m_pImpl == nullptr) return -1; @@ -344,7 +344,7 @@ int AppCustomTrustAnchor::install(bool withSystemCerts) noexcept return ret; } -int AppCustomTrustAnchor::uninstall(void) noexcept +int TrustAnchor::uninstall(void) noexcept { if (this->m_pImpl == nullptr) return -1; @@ -352,7 +352,7 @@ int AppCustomTrustAnchor::uninstall(void) noexcept return this->m_pImpl->uninstall(); } -int AppCustomTrustAnchor::launch(bool withSystemCerts) noexcept +int TrustAnchor::launch(bool withSystemCerts) noexcept { if (this->m_pImpl == nullptr) return -1; diff --git a/src/transec/AppCustomTrustAnchor.h b/src/transec/TrustAnchor.h index c9e1c92..ee2bd9c 100644 --- a/src/transec/AppCustomTrustAnchor.h +++ b/src/transec/TrustAnchor.h @@ -14,10 +14,10 @@ * limitations under the License. */ /* - * @file AppCustomTrustAnchor.h + * @file TrustAnchor.h * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief App custom trust anchor C++ API header + * @brief Trust anchor C++ API header */ #pragma once @@ -27,19 +27,19 @@ namespace transec { -class AppCustomTrustAnchor { +class TrustAnchor { public: - explicit AppCustomTrustAnchor(const std::string &packageId, - const std::string &certsDir, - uid_t uid) noexcept; - explicit AppCustomTrustAnchor(const std::string &packageId, - const std::string &certsDir) noexcept; - virtual ~AppCustomTrustAnchor(void); + explicit TrustAnchor(const std::string &packageId, + const std::string &certsDir, + uid_t uid) noexcept; + explicit TrustAnchor(const std::string &packageId, + const std::string &certsDir) noexcept; + virtual ~TrustAnchor(void); - AppCustomTrustAnchor(const AppCustomTrustAnchor &) = delete; - AppCustomTrustAnchor(AppCustomTrustAnchor &&) = delete; - AppCustomTrustAnchor &operator=(const AppCustomTrustAnchor &) = delete; - AppCustomTrustAnchor &operator=(AppCustomTrustAnchor &&) = delete; + TrustAnchor(const TrustAnchor &) = delete; + TrustAnchor(TrustAnchor &&) = delete; + TrustAnchor &operator=(const TrustAnchor &) = delete; + TrustAnchor &operator=(TrustAnchor &&) = delete; int install(bool withSystemCerts) noexcept; int uninstall(void) noexcept; diff --git a/src/transec/acta/app-custom-trust-anchor.h b/src/transec/acta/app-custom-trust-anchor.h deleted file mode 100644 index 810e172..0000000 --- a/src/transec/acta/app-custom-trust-anchor.h +++ /dev/null @@ -1,152 +0,0 @@ -/* - * Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - - -/** - * @file app-custom-trust-anchor.h - * @brief App custom trust anchor CAPI header. - */ - - -#ifndef APP_CUSTOM_TRUST_ANCHOR_H -#define APP_CUSTOM_TRUST_ANCHOR_H - - -#include <stddef.h> -#include <sys/types.h> - - -#ifdef __cplusplus -extern "C" { -#endif - - -/** - * @brief Install app custom trust anchor for global app. - * @details App custom certificates would be installed on system. - * This function should be called before acta_global_launch(). - * @param[in] package_id Global package id - * @param[in] app_certificates_path App custom certificates path - * @param[in] with_system_certificates Whether system certificates use or not - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_global_launch() - * @see acta_global_uninstall() - */ -int acta_global_install(const char *package_id, - const char *app_certificates_path, - bool with_system_certificates); - - -/** - * @brief Install app custom trust anchor for user app. - * @details App custom certificates would be installed on system. - * This function should be called before acta_usr_launch(). - * @param[in] package_id User package id - * @param[in] app_certificates_path App custom certificates path - * @param[in] uid user id - * @param[in] with_system_certificates Whether system certificates use or not - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_usr_launch() - * @see acta_usr_uninstall() - */ -int acta_usr_install(const char *package_id, - const char *app_certificates_path, - uid_t uid, - bool with_system_certificates); - - -/** - * @brief Launch app custom trust anchor for global app. - * @details After lauching app custom trust anchor, app can use custom certificates. - * @param[in] package_id Global package id - * @param[in] app_certificates_path App custom certificates path - * @param[in] with_system_certificates Whether system certificates use or not - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_global_install() - */ -int acta_global_launch(const char *package_id, - const char *app_certificates_path, - bool with_system_certificates); - - -/** - * @brief Launch app custom trust anchor for user app. - * @details After lauching app custom trust anchor, app can use custom certificates. - * @param[in] package_id User package id - * @param[in] app_certificates_path App custom certificates path - * @param[in] with_system_certificates Whether system certificates use or not - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_global_install() - */ -int acta_usr_launch(const char *package_id, - const char *app_certificates_path, - uid_t uid, - bool with_system_certificates); - - -/** - * @brief Uninstall app custom trust anchor for global app. - * @param[in] package_id Global package id - * @param[in] app_certificates_path App custom certificates path - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_global_install() - */ -int acta_global_uninstall(const char *package_id, - const char *app_certificates_path); - - -/** - * @brief Uninstall app custom trust anchor for user app. - * @param[in] package_id User package id - * @param[in] app_certificates_path App custom certificates path - * @return #ACTA_ERROR_NONE on success, - * negative on error - * @retval #ACTA_ERROR_NONE Successful - * @retval #ACTA_ERROR_OUT_OF_MEMORY Out of memory error - * @retval #ACTA_ERROR_INTERNAL Internal error - * @see acta_usr_install() - */ -int acta_usr_uninstall(const char *package_id, - const char *app_certificates_path, - uid_t uid); - - -#ifdef __cplusplus -} /* extern */ -#endif - - -#endif /* APP_CUSTOM_TRUST_ANCHOR_H */ diff --git a/src/transec/acta/acta-error.h b/src/transec/tanchor/error.h index 5089b69..d91264e 100644 --- a/src/transec/acta/acta-error.h +++ b/src/transec/tanchor/error.h @@ -16,13 +16,13 @@ /** - * @file acta_error.h + * @file error.h * @brief Error enums and defines. */ -#ifndef ACTA_ERROR_H -#define ACTA_ERROR_H +#ifndef TRUST_ANCHOR_ERROR_H +#define TRUST_ANCHOR_ERROR_H #include <errno.h> @@ -33,18 +33,18 @@ extern "C" { #endif -#define ACTA_ERROR_BASE -0x01000000 +#define TRUST_ANCHOR_ERROR_BASE -0x01000000 /** - * @brief Enumeration for ACTA error values. + * @brief Enumeration for trust anchor error values. */ typedef enum { - ACTA_ERROR_NONE = 0, - ACTA_ERROR_INVALID_PARAMETER = -EINVAL, - ACTA_ERROR_OUT_OF_MEMORY = -ENOMEM, - ACTA_ERROR_INTERNAL = ACTA_ERROR_BASE | 0x01 -} acta_error_e; + TRUST_ANCHOR_ERROR_NONE = 0, + TRUST_ANCHOR_ERROR_INVALID_PARAMETER = -EINVAL, + TRUST_ANCHOR_ERROR_OUT_OF_MEMORY = -ENOMEM, + TRUST_ANCHOR_ERROR_INTERNAL = TRUST_ANCHOR_ERROR_BASE | 0x01 +} trust_anchor_error_e; #ifdef __cplusplus @@ -52,4 +52,4 @@ typedef enum { #endif -#endif /* ACTA_ERROR_H */ +#endif /* TRUST_ANCHOR_ERROR_H */ diff --git a/src/transec/tanchor/trust-anchor.h b/src/transec/tanchor/trust-anchor.h new file mode 100644 index 0000000..274efbb --- /dev/null +++ b/src/transec/tanchor/trust-anchor.h @@ -0,0 +1,152 @@ +/* + * Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + + +/** + * @file trust-anchor.h + * @brief Trust anchor CAPI header + */ + + +#ifndef TRUST_ANCHOR_H +#define TRUST_ANCHOR_H + + +#include <stddef.h> +#include <sys/types.h> + + +#ifdef __cplusplus +extern "C" { +#endif + + +/** + * @brief Install trust anchor for global app. + * @details App custom certificates would be installed on system. + * This function should be called before trust_anchor_global_launch(). + * @param[in] package_id Global package id + * @param[in] app_certificates_path App custom certificates path + * @param[in] with_system_certificates Whether system certificates use or not + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_global_launch() + * @see trust_anchor_global_uninstall() + */ +int trust_anchor_global_install(const char *package_id, + const char *app_certificates_path, + bool with_system_certificates); + + +/** + * @brief Install trust anchor for user app. + * @details App custom certificates would be installed on system. + * This function should be called before trust_anchor_usr_launch(). + * @param[in] package_id User package id + * @param[in] app_certificates_path App custom certificates path + * @param[in] uid user id + * @param[in] with_system_certificates Whether system certificates use or not + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_usr_launch() + * @see trust_anchor_usr_uninstall() + */ +int trust_anchor_usr_install(const char *package_id, + const char *app_certificates_path, + uid_t uid, + bool with_system_certificates); + + +/** + * @brief Launch trust anchor for global app. + * @details After lauching trust anchor, app can use custom certificates. + * @param[in] package_id Global package id + * @param[in] app_certificates_path App custom certificates path + * @param[in] with_system_certificates Whether system certificates use or not + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_global_install() + */ +int trust_anchor_global_launch(const char *package_id, + const char *app_certificates_path, + bool with_system_certificates); + + +/** + * @brief Launch trust anchor for user app. + * @details After lauching trust anchor, app can use custom certificates. + * @param[in] package_id User package id + * @param[in] app_certificates_path App custom certificates path + * @param[in] with_system_certificates Whether system certificates use or not + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_global_install() + */ +int trust_anchor_usr_launch(const char *package_id, + const char *app_certificates_path, + uid_t uid, + bool with_system_certificates); + + +/** + * @brief Uninstall trust anchor for global app. + * @param[in] package_id Global package id + * @param[in] app_certificates_path App custom certificates path + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_global_install() + */ +int trust_anchor_global_uninstall(const char *package_id, + const char *app_certificates_path); + + +/** + * @brief Uninstall trust anchor for user app. + * @param[in] package_id User package id + * @param[in] app_certificates_path App custom certificates path + * @return #TRUST_ANCHOR_ERROR_NONE on success, + * negative on error + * @retval #TRUST_ANCHOR_ERROR_NONE Successful + * @retval #TRUST_ANCHOR_ERROR_OUT_OF_MEMORY Out of memory error + * @retval #TRUST_ANCHOR_ERROR_INTERNAL Internal error + * @see trust_anchor_usr_install() + */ +int trust_anchor_usr_uninstall(const char *package_id, + const char *app_certificates_path, + uid_t uid); + + +#ifdef __cplusplus +} /* extern */ +#endif + + +#endif /* TRUST_ANCHOR_H */ diff --git a/tests/transec/CMakeLists.txt b/tests/transec/CMakeLists.txt index 90101d8..8d06282 100644 --- a/tests/transec/CMakeLists.txt +++ b/tests/transec/CMakeLists.txt @@ -21,8 +21,8 @@ SET(TEST_SRCS test-util.cpp test-capi-installer.cpp test-capi-launcher.cpp - test-acta-installer.cpp - test-acta-launcher.cpp + test-installer.cpp + test-launcher.cpp test-certificate.cpp ) diff --git a/tests/transec/test-acta-installer.cpp b/tests/transec/test-acta-installer.cpp deleted file mode 100644 index 580b98a..0000000 --- a/tests/transec/test-acta-installer.cpp +++ /dev/null @@ -1,126 +0,0 @@ -/* - * Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ -/* - * @file test-acta-installer.cpp - * @author Sangwan Kwon (sangwan.kwon@samsung.com) - * @version 0.1 - * @brief Unit test program of ACTA for installer - */ - -#include <dpl/test/test_runner.h> - -#include <AppCustomTrustAnchor.h> - -#include <sched.h> -#include <unistd.h> - -#include <iostream> - -#include "test-resource.h" - -RUNNER_TEST_GROUP_INIT(T0400_API_ACTA_INSTALLER) - -using namespace transec; - -RUNNER_TEST(T0401_ACTA_INSTALL_GLOBAL_APP_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); -} - -RUNNER_TEST(T0402_ACTA_INSTALL_GLOBAL_APP_WITH_SYS_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR); - int ret = acta.install(true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); -} - -RUNNER_TEST(T0403_ACTA_INSTALL_USER_APP_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); -} - -RUNNER_TEST(T0404_ACTA_INSTALL_USER_APP_WITH_SYS_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); - int ret = acta.install(true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); -} - -RUNNER_TEST(T0405_ACTA_INSTALL_GLOBAL_APP_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); -} - -RUNNER_TEST(T0406_ACTA_INSTALL_GLOBAL_APP_WITH_SYS_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); - int ret = acta.install(true); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); -} - -RUNNER_TEST(T0407_ACTA_INSTALL_USER_APP_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); -} - -RUNNER_TEST(T0408_ACTA_INSTALL_USER_APP_WITH_SYS_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); - int ret = acta.install(true); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); -} - -RUNNER_TEST(T0421_ACTA_UNINSTALL_GLOBAL_APP_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); - - ret = acta.uninstall(); - RUNNER_ASSERT_MSG(ret == 0, "ACTA uninstall should be success."); -} - -RUNNER_TEST(T0422_ACTA_UNINSTALL_USER_APP_POSITIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); - int ret = acta.install(false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); - - ret = acta.uninstall(); - RUNNER_ASSERT_MSG(ret == 0, "ACTA uninstall should be success."); -} - -RUNNER_TEST(T0423_ACTA_UNINSTALL_GLOBAL_APP_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); - int ret = acta.uninstall(); - RUNNER_ASSERT_MSG(ret != 0, "ACTA uninstall should be fail."); -} - -RUNNER_TEST(T0424_ACTA_UNINSTALL_USER_APP_NEGATIVE) -{ - AppCustomTrustAnchor acta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); - int ret = acta.uninstall(); - RUNNER_ASSERT_MSG(ret != 0, "ACTA uninstall should be fail."); -} diff --git a/tests/transec/test-capi-installer.cpp b/tests/transec/test-capi-installer.cpp index 775c29c..4dae1f0 100644 --- a/tests/transec/test-capi-installer.cpp +++ b/tests/transec/test-capi-installer.cpp @@ -17,91 +17,91 @@ * @file test-capi-installer.cpp * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief Unit test program of ACTA CAPI for installer + * @brief Unit test program of Trust Anchor CAPI for installer */ #include <dpl/test/test_runner.h> -#include "acta/app-custom-trust-anchor.h" +#include "tanchor/trust-anchor.h" #include "test-resource.h" -RUNNER_TEST_GROUP_INIT(T0800_CAPI_ACTA_INSTALLER) +RUNNER_TEST_GROUP_INIT(T0800_CAPI_TRUST_ANCHOR_INSTALLER) -RUNNER_TEST(T0801_CAPI_ACTA_INSTALL_GLOBAL_APP_POSITIVE) +RUNNER_TEST(T0801_CAPI_TRUST_ANCHOR_INSTALL_GLOBAL_APP_POSITIVE) { - int ret = acta_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, false); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); } -RUNNER_TEST(T0802_CAPI_ACTA_INSTALL_GLOBAL_APP_WITH_SYS_POSITIVE) +RUNNER_TEST(T0802_CAPI_TRUST_ANCHOR_INSTALL_GLOBAL_APP_WITH_SYS_POSITIVE) { - int ret = acta_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, true); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); } -RUNNER_TEST(T0803_CAPI_ACTA_INSTALL_USER_APP_POSITIVE) +RUNNER_TEST(T0803_CAPI_TRUST_ANCHOR_INSTALL_USER_APP_POSITIVE) { - int ret = acta_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, false); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); } -RUNNER_TEST(T0804_CAPI_ACTA_INSTALL_USER_APP_WITH_SYS_POSITIVE) +RUNNER_TEST(T0804_CAPI_TRUST_ANCHOR_INSTALL_USER_APP_WITH_SYS_POSITIVE) { - int ret = acta_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, true); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); } -RUNNER_TEST(T0805_CAPI_ACTA_INSTALL_GLOBAL_APP_NEGATIVE) +RUNNER_TEST(T0805_CAPI_TRUST_ANCHOR_INSTALL_GLOBAL_APP_NEGATIVE) { - int ret = acta_global_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, false); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, false); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor install should be fail."); } -RUNNER_TEST(T0806_CAPI_ACTA_INSTALL_GLOBAL_APP_WITH_SYS_NEGATIVE) +RUNNER_TEST(T0806_CAPI_TRUST_ANCHOR_INSTALL_GLOBAL_APP_WITH_SYS_NEGATIVE) { - int ret = acta_global_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, true); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, true); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor install should be fail."); } -RUNNER_TEST(T0807_CAPI_ACTA_INSTALL_USER_APP_NEGATIVE) +RUNNER_TEST(T0807_CAPI_TRUST_ANCHOR_INSTALL_USER_APP_NEGATIVE) { - int ret = acta_usr_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID, false); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); + int ret = trust_anchor_usr_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID, false); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor install should be fail."); } -RUNNER_TEST(T0808_CAPI_ACTA_INSTALL_USER_APP_WITH_SYS_NEGATIVE) +RUNNER_TEST(T0808_CAPI_TRUST_ANCHOR_INSTALL_USER_APP_WITH_SYS_NEGATIVE) { - int ret = acta_usr_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID, true); - RUNNER_ASSERT_MSG(ret != 0, "ACTA install should be fail."); + int ret = trust_anchor_usr_install(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID, true); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor install should be fail."); } -RUNNER_TEST(T0821_CAPI_ACTA_UNINSTALL_GLOBAL_APP_POSITIVE) +RUNNER_TEST(T0821_CAPI_TRUST_ANCHOR_UNINSTALL_GLOBAL_APP_POSITIVE) { - int ret = acta_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, false); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); - ret = acta_global_uninstall(DUMMY_PKG_ID, APP_CERTS_DIR); - RUNNER_ASSERT_MSG(ret == 0, "ACTA uninstall should be success."); + ret = trust_anchor_global_uninstall(DUMMY_PKG_ID, APP_CERTS_DIR); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor uninstall should be success."); } -RUNNER_TEST(T0822_CAPI_ACTA_UNINSTALL_USER_APP_POSITIVE) +RUNNER_TEST(T0822_CAPI_TRUST_ANCHOR_UNINSTALL_USER_APP_POSITIVE) { - int ret = acta_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, false); - RUNNER_ASSERT_MSG(ret == 0, "ACTA install should be success."); + int ret = trust_anchor_usr_install(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID, false); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor install should be success."); - ret = acta_usr_uninstall(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); - RUNNER_ASSERT_MSG(ret == 0, "ACTA uninstall should be success."); + ret = trust_anchor_usr_uninstall(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor uninstall should be success."); } -RUNNER_TEST(T0823_CAPI_ACTA_UNINSTALL_GLOBAL_APP_NEGATIVE) +RUNNER_TEST(T0823_CAPI_TRUST_ANCHOR_UNINSTALL_GLOBAL_APP_NEGATIVE) { - int ret = acta_global_uninstall(DUMMY_PKG_ID, DUMMY_CERTS_DIR); - RUNNER_ASSERT_MSG(ret != 0, "ACTA uninstall should be fail."); + int ret = trust_anchor_global_uninstall(DUMMY_PKG_ID, DUMMY_CERTS_DIR); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor uninstall should be fail."); } -RUNNER_TEST(T0824_CAPI_ACTA_UNINSTALL_USER_APP_NEGATIVE) +RUNNER_TEST(T0824_CAPI_TRUST_ANCHOR_UNINSTALL_USER_APP_NEGATIVE) { - int ret = acta_usr_uninstall(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); - RUNNER_ASSERT_MSG(ret != 0, "ACTA uninstall should be fail."); + int ret = trust_anchor_usr_uninstall(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); + RUNNER_ASSERT_MSG(ret != 0, "Trust Anchor uninstall should be fail."); } diff --git a/tests/transec/test-capi-launcher.cpp b/tests/transec/test-capi-launcher.cpp index 5b4e4b6..a941078 100644 --- a/tests/transec/test-capi-launcher.cpp +++ b/tests/transec/test-capi-launcher.cpp @@ -17,34 +17,34 @@ * @file test-capi-launcher.cpp * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief Unit test program of ACTA for launcher + * @brief Unit test program of Trust Anchor for launcher */ #include <dpl/test/test_runner.h> -#include <acta/app-custom-trust-anchor.h> +#include <tanchor/trust-anchor.h> #include <unistd.h> #include "test-util.h" #include "test-resource.h" -RUNNER_TEST_GROUP_INIT(T0500_CAPI_ACTA_LAUNCER) +RUNNER_TEST_GROUP_INIT(T0500_CAPI_TRUST_ANCHOR_LAUNCER) // Launch needs CAP_SYS_ADMIN -RUNNER_TEST(T0501_ACTA_LAUNCH) +RUNNER_TEST(T0501_TRUST_ANCHOR_LAUNCH) { auto beforeLs = test::util::ls(TZ_SYS_RO_CA_CERTS); auto beforeCat = test::util::cat(TZ_SYS_RO_CA_BUNDLE); - int ret = acta_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, true); + int ret = trust_anchor_global_install(DUMMY_PKG_ID, APP_CERTS_DIR, true); // pre-condition int pid = fork(); if (pid == 0) { - ret = acta_global_launch(DUMMY_PKG_ID, APP_CERTS_DIR, true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA launch should be success."); + ret = trust_anchor_global_launch(DUMMY_PKG_ID, APP_CERTS_DIR, true); + RUNNER_ASSERT_MSG(ret == 0, "Trust Anchor launch should be success."); auto afterLsChild = test::util::ls(TZ_SYS_RO_CA_CERTS); RUNNER_ASSERT_MSG(beforeLs != afterLsChild, "Failed to launch."); diff --git a/tests/transec/test-installer.cpp b/tests/transec/test-installer.cpp new file mode 100644 index 0000000..b7398d7 --- /dev/null +++ b/tests/transec/test-installer.cpp @@ -0,0 +1,126 @@ +/* + * Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/* + * @file test-installer.cpp + * @author Sangwan Kwon (sangwan.kwon@samsung.com) + * @version 0.1 + * @brief Unit test program of Trust Anchor for installer + */ + +#include <dpl/test/test_runner.h> + +#include <TrustAnchor.h> + +#include <sched.h> +#include <unistd.h> + +#include <iostream> + +#include "test-resource.h" + +RUNNER_TEST_GROUP_INIT(T0400_API_TRUST_ANCHOR_INSTALLER) + +using namespace transec; + +RUNNER_TEST(T0401_TRUST_ANCHOR_INSTALL_GLOBAL_APP_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); +} + +RUNNER_TEST(T0402_TRUST_ANCHOR_INSTALL_GLOBAL_APP_WITH_SYS_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR); + int ret = ta.install(true); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); +} + +RUNNER_TEST(T0403_TRUST_ANCHOR_INSTALL_USER_APP_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); +} + +RUNNER_TEST(T0404_TRUST_ANCHOR_INSTALL_USER_APP_WITH_SYS_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); + int ret = ta.install(true); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); +} + +RUNNER_TEST(T0405_TRUST_ANCHOR_INSTALL_GLOBAL_APP_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret != 0, "TA install should be fail."); +} + +RUNNER_TEST(T0406_TRUST_ANCHOR_INSTALL_GLOBAL_APP_WITH_SYS_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); + int ret = ta.install(true); + RUNNER_ASSERT_MSG(ret != 0, "TA install should be fail."); +} + +RUNNER_TEST(T0407_TRUST_ANCHOR_INSTALL_USER_APP_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret != 0, "TA install should be fail."); +} + +RUNNER_TEST(T0408_TRUST_ANCHOR_INSTALL_USER_APP_WITH_SYS_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); + int ret = ta.install(true); + RUNNER_ASSERT_MSG(ret != 0, "TA install should be fail."); +} + +RUNNER_TEST(T0421_TRUST_ANCHOR_UNINSTALL_GLOBAL_APP_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); + + ret = ta.uninstall(); + RUNNER_ASSERT_MSG(ret == 0, "TA uninstall should be success."); +} + +RUNNER_TEST(T0422_TRUST_ANCHOR_UNINSTALL_USER_APP_POSITIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR, DUMMY_UID); + int ret = ta.install(false); + RUNNER_ASSERT_MSG(ret == 0, "TA install should be success."); + + ret = ta.uninstall(); + RUNNER_ASSERT_MSG(ret == 0, "TA uninstall should be success."); +} + +RUNNER_TEST(T0423_TRUST_ANCHOR_UNINSTALL_GLOBAL_APP_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR); + int ret = ta.uninstall(); + RUNNER_ASSERT_MSG(ret != 0, "TA uninstall should be fail."); +} + +RUNNER_TEST(T0424_TRUST_ANCHOR_UNINSTALL_USER_APP_NEGATIVE) +{ + TrustAnchor ta(DUMMY_PKG_ID, DUMMY_CERTS_DIR, DUMMY_UID); + int ret = ta.uninstall(); + RUNNER_ASSERT_MSG(ret != 0, "TA uninstall should be fail."); +} diff --git a/tests/transec/test-acta-launcher.cpp b/tests/transec/test-launcher.cpp index ec00fae..6b95660 100644 --- a/tests/transec/test-acta-launcher.cpp +++ b/tests/transec/test-launcher.cpp @@ -14,40 +14,40 @@ * limitations under the License. */ /* - * @file test-actc-launcher.cpp + * @file test-launcher.cpp * @author Sangwan Kwon (sangwan.kwon@samsung.com) * @version 0.1 - * @brief Unit test program of ACTA for launcher + * @brief Unit test program of Trust Anchor for launcher */ #include <dpl/test/test_runner.h> -#include <AppCustomTrustAnchor.h> +#include <TrustAnchor.h> #include <unistd.h> #include "test-util.h" #include "test-resource.h" -RUNNER_TEST_GROUP_INIT(T0600_API_ACTA_LAUNCER) +RUNNER_TEST_GROUP_INIT(T0600_API_TRUST_ANCHOR_LAUNCER) using namespace transec; // Launch needs CAP_SYS_ADMIN -RUNNER_TEST(T0601_ACTA_LAUNCH) +RUNNER_TEST(T0601_TRUST_ANCHOR_LAUNCH) { auto beforeLs = test::util::ls(TZ_SYS_RO_CA_CERTS); auto beforeCat = test::util::cat(TZ_SYS_RO_CA_BUNDLE); - AppCustomTrustAnchor acta(DUMMY_PKG_ID, APP_CERTS_DIR); - int ret = acta.install(true); + TrustAnchor ta(DUMMY_PKG_ID, APP_CERTS_DIR); + int ret = ta.install(true); // pre-condition int pid = fork(); if (pid == 0) { - ret = acta.launch(true); - RUNNER_ASSERT_MSG(ret == 0, "ACTA launch should be success."); + ret = ta.launch(true); + RUNNER_ASSERT_MSG(ret == 0, "TA launch should be success."); auto afterLsChild = test::util::ls(TZ_SYS_RO_CA_CERTS); RUNNER_ASSERT_MSG(beforeLs != afterLsChild, "Failed to launch."); |